You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!

Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.

If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.

Having a problem logging in? Please visit this page to clear all LQ-related cookies.

Introduction to Linux - A Hands on Guide

This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.

I'm pretty sure I screwed myself, but just want confirmation from more knowledgeable folks.

I had a machine running Slackware. I stored my Quicken data on it (I ran Quicken with Netraverse Win4Lin). I had a habit of using gpgdir to encrypt my Quicken files whenever not in use.

I bought new machine parts recently (processor/motherboard) and copied my Quicken files to backup location before wiping all drives to test brand new installation of Slackware on new hardware. Unfortunately, the backed up files were the .gpg encrypted ones....and now I have wiped the old drives by reformatting.

The only things I wrote down from my previous machine regarding gpg keys was the identifers, my pass phrase and (I'm not at home now, but I think...) some other piece of information (salt?) that it gave me when it generated the keys.

So, is there any way that I can still get those files decrypted? Or is "rm" my only remaining option?

Originally posted by killerbob AFAIK, your passphrase is used to generate your keys, and that's a static algorithm. At least, that's how it is with other encryption schemes.

If that's the case, you should be able to regenrate your decryption key with your passphrase again. Doesn't hurt to try, no?

Thanks for the thoughts. I gave it a shot using all original information (I had written it all down). It wouldn't generate the same IDs or fingerprint. My guess is it's because of that "random number generation" business that goes on during key generation.